data base

database multiple questions chapter 15,16

[Pin It]

A ____________ is a disconnected, memory-resident representation of the database which contains tables, columns, rows, relationships, and constraints.

a. DataSymbol

b. DataObject

c. DataMart

d. DataSet

_______ is an object-oriented programming language developed by Sun Microsystems that runs on top of Web browser software.

a. ActiveX

b. Python

c. Java

d. JavaScript

____________ is rapidly becoming the data exchange standard for e-commerce applications; it is important because it provides the semantics that facilitate the sharing, exchange, and manipulation of structured documents over organizational boundaries.

a. Semantic Markup Language (SML)

b. Unified Markup Language (UML)

c. Extensible Markup Language (XML)

d. PML (Programming Markup Language (PML)

________ the objects that manage the connection with a data source and provide data to the consumers.

a. Providers

b. Servers

c. Consumers

d. Producers

An _____________ document is an advanced data definition language that is used to describe the structure (elements, data types, relationship types, ranges, and default values) of XML data documents.

a. Unified Markup Language (UML)

b. Extensible Markup Language (XML)

c. Semantic Markup Language (SML)

d. XML Schema Definition (XSD)

Which of the following is NOT a common feature of a web application server?

a. Security and authentication of users

b. Database access with transaction management

c. Performance and fault tolerance

d. All of these choices are correct.

To define a ______________ you must create a data source name (DSN) for the data source.

a. data source

b. detailed data source

c. named space

d. remote data space

A __________ is an external application that is automatically invoked by the browser when needed.

a. plug-in

b. program

c. preference

d. app

Which of the following is NOT a database connectivity option?

a. Native SQL connectivity

b. ODBC, DAO, RDO

c. ABC.NET

d. OLE-DB

Which of the following is a type of cloud computing implementation?

a. Private cloud

b. Public cloud

c. Community cloud

d. All of these choices are correct.

___________________ refers to the mechanisms through which application programs interact and communicate with data repositories.

a. Database connectivity

b. Database management

c. Database development

d. Database schema

A _________ is a series of instructions executed in interpreter mode; it is a plain text file that is not compiled like COBOL, C++, or Java.

a. script

b. processor

c. module

d. function

Microsoft developed _________to answer the need for non-relational data access and to simplify data connectivity.

a. DEO

b. ODBC

c. OLE-DB

d. RDO

_______ was the first piece of Microsoft’s strategy to provide a unified object-oriented framework for the development of next-generation applications.

a. ODBC

b. RDO

c. OLE-DB

d. DEO

Which of the following is a well-defined web server interface used frequently today?

a. Constant interfaces (CI)

b. Artificial interfaces (AI)

c. Common gateway interfaces (CGI)

d. None of these choices are correct.

______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

a. Cloud computing

b. Cloud servicing

c. Cloud networking

d. Cloud programming

_____________ is a file that describes XML elements—it provides the composition of the database’s logical model, and defines the syntax rules or valid tags for each type of XML document.

a. Extensible Markup Language (XML)

b. Semantic Markup Language (SML)

c. Unified Markup Language (UML)

d. Document Type Definition (DTD)

Which of the following is/are the basic components of the ODBC architecture?

a. A Driver Manager

b. An ODBC Driver

c. A high level ODBC API

d. All of these choices are correct.

Once the DataSet is populated, it is completely independent of the data source – that’s why it’s called “_________”.

a. disjoint

b. apportioned

c. independent

d. disconnected

Which of the following is NOT one of the most prevalent characteristics of cloud computing services?

a. Higher cost and standard pricing

b. Service orientation

c. Managed operations

d. All of these choices are correct.

Which of the following is considered an advantage of SQL data services?

a. Dynamic and automatic load balancing

b. Automated backup and disaster recovery

c. High level of failure tolerance

d. All of these choices are correct.

Which of the following has the potential to turn basic IT services into “commodity” services such as electricity, gas, and water, and to enable a revolution that could change not only the way that companies do business, but the IT business itself?

a. Cloud services

b. DataMart systems

c. Distributed database systems

d. Cybersecurity services

Which of the following is a type of cloud service that offers turnkey applications that run in the cloud?

a. PaaS

b. IaaS

c. SaaS

d. None of these choices are correct.

Which of the following is NOT considered a main advantage of cloud computing services?

a. Low initial cost of entry

b. Complex licensing schemes

c. High reliability and performance

d. Fast provisioning

Which of the following is required to create an ODBC data source name?

a. ODBC driver

b. ODBC driver parameters

c. A DSN name

d. All of these choices are correct.

__________________ is an application programming interface that allows a Java program to interact with a wide range of data sources (relational databases, tabular data sources, spreadsheets, and text files).

a. Java Database Connectivity (JDBC)

b. Unified Markup Language (UML)

c. Semantic Markup Language (SML)

d. Document Type Definition (DTD)

___________ is a meta-language used to represent and manipulate data elements.

a. Semantic Markup Language (SML)

b. Extensible Markup Language (XML)

c. PML (Programming Markup Language (PML)

d. Unified Markup Language (UML)

____________________ are used to extend the functionality of the web server to provide more services and to provide support for access to external databases, fax services, telephony services, directory services, etc.

a. Server users

b. Web server interfaces

c. Server programs

d. Web server associations

______ provides an optimized interface that exposed the functionality of the Jet data engine (on which MS Access database if based on) to programmers.

a. REO

b. DAO

c. OLE-DC

d. ODBC

The OLE-DB model is based on which of the two types of objects?

a. consumers, providers

b. clients, servers

c. consumers, producers

d. clients, users

Which of the following is NOT considered a disadvantage of cloud computing services?

a. Issues of security, privacy, and compliances

b. Low initial cost of entry

c. Loss of ownership and control

d. Complex licensing schemes

A ______________ is a middleware application that expands the functionality of servers by linking them to a wide range of services such as databases, directory systems, and search engines.

a. web dominant server

b. client application server

c. web application server

d. plug-in server

_______________is “a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computer resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

a. Cloud computing

b. Cloud networking

c. Cloud programming

d. Cloud servicing

____ allows any Windows application to access relational data sources using SQL via a standard application programming interface (API).

a. OLE-DC

b. RAO

c. ODBC

d. REO

The web is a(n) ________________ in that at any given time, a web server does not know the status of any of the clients communicating with it.

a. stateless system

b. simple configuration

c. dormant medium

d. inactive status

To provide such support for scripting languages, especially the ones used for web development, such as Active Server Pages (ASP) and ActiveX, Microsoft developed a new object framework called _______________.

a. ActiveX Data Objects (ADO)

b. Remote Data Objects (RDO)Servers

c. Object Linking and Embedding for Database (OLE-DB)

d. Data Access Objects (DAO)

_______________ refers to Internet-based data management services that provide access to hosted relational data management using standard protocols and common programming interfaces.

a. Cloud data services

b. SQL data services

c. Database services

d. DataMart data services

_______________ scripts contain the code that is required to connect, query, and update a database from a Web front end.

a. ColdFusion

b. Microsoft

c. Java

d. File Manager

______ uses the lower-level DAO and ODBC for direct access to databases.

a. OLE-DC

b. ODBC

c. RDO

d. DEO

Using the tags and words on the right, complete the XML document below. The “Customers” tag contains zero or more “Customer” children and the “Customer” tag may contain all of the remaining tags as children.

Given the following XML document that contains an internal DTD. Complete the DTD to accurately describe the XML.

_____ are raw facts of interest to an end user. Examples include a person’s date of birth, an employee name, the number of pencils in stock, etc.

a. Knowledge

b. Statistics

c. Data

d. Information

Which of the following is NOT a benefit of a CASE tool?

a. Increase in development time and costs

b. Easier maintenance of application systems

c. Automation of the SDLC

d. Standardization of system development methodologies

____________ allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals.

a. CASE tools

b. Database Management

c. User Planning

d. Information Engineering

_________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

a. Performance

b. Maintenance

c. Security

d. Design

____________ refers to activities and measures that ensures the confidentiality, integrity, and availability of an information system and its main asset, data.

a. Performance

b. Maintenance

c. Security

d. Design

Which of the following is an example of data dictionary usage using SQL statements?

a. List the names of the columns for all tables created by JONESVI in the current database

b. List the user and table names for all users who can alter the database structure for any table in the database

c. List the names and creation dates of all tables created by the user JONESVI in the current database

d. All of these choices are correct.

Which of the following is NOT a desired managerial characteristic or skill for a DBA?

a. Conflict resolution skills

b. Analytical skills

c. Negotiation skills

d. Knowledge of database life cycle

Which of the following is NOT a source of dirty data?

a. Typographical errors

b. Nonstandard abbreviations

c. Use of synonyms across systems

d. Enforcement of integrity constraints

The DBA works with application programmers to ensure the quality and integrity of database design and transactions by ensuring that transactions are:

a. variable and static.

b. small, linear, and isolated.

c. correct, efficient, and compliant.

d. All of these choices are correct.

A(n) ________________ automatically records a brief description of database operations performed by all users.

a. audit log

b. usage table

c. data dictionary

d. security manual

Which of the following is NOT a desired technical characteristic or skill for a DBA?

a. Negotiation skills

b. Database modeling and design

c. Structured methodologies

d. Knowledge of database life cycle

Which of the following is NOT an area that a DBA must define, communicate and enforce procedures for?

a. Providing end-user training

b. Establishing backup and recovery for databases

c. Finding new customers

d. Finding new database software

Which of the following is NOT an activity of characteristic of a DBA?

a. is DBMS-specific

b. has a tactical orientation

c. focuses on the long term

d. controls and supervises

Which of the following DBA activities are used to support end users?

a. Resolving conflicts and problems

b. Finding solution to information needs

c. Ensuring quality and integrity of data and applications

d. All of these choices are correct.

Which of the following is considered the two most important assets of any organization?

a. Users and costs

b. Money and power

c. Customers and goals

d. People and data

Some of the common features of a data dictionary include:

a. end users and administrators of the database.

b. relationships among data elements.

c. tables defined in all databases.

d. All of these choices are correct

The technical aspects of the DBA’s job are rooted in which of the following areas of operation?

a. training and supporting users

b. evaluating, selecting, and installing the DBMS and related utilities

c. testing and evaluating databases and applications

d. All of these choices are correct.

The backup and recovery measures must include which of the following?

a. convenient and safe backup storage.

b. physical protection of both hardware and software.

c. periodic data and application backups.

d. All of these choices are correct.

Which of the following is NOT considered one of the DBA’s responsibilities?

a. Responsible for managing the overall corporate data resource, both computerized and non-computerized

b. Position requires both managerial and technical skills

c. Control and management of the shared database within an organization

d. All of these choices are part of the DBA’s responsibilities.

Which of the following is NOT a role the DBMS facilitates?

a. Distribution of data and information

b. Interpretation and presentation of data

c. Data preservation and monitoring data usage

d. All of these choices are correct.

_________ is a comprehensive approach to ensuring the accuracy, validity, and timeliness of the data.

a. Data construction

b. Data quality

c. Data statistics

d. Dirty data

Which of the following is NOT an activity of characteristic of a DA?

a. has a tactical orientation

b. focuses on the long term

c. performs strategic planning

d. is DBMS-independent

Which of the following must happen when a corrupting security breach occurs?

a. The entire database must be removed

b. The database must be recovered to a consistent state

c. The users must be notified

d. The business must immediately shutdown all operations

______________ is data that contains inaccuracies or inconsistencies (i.e. data that lacks integrity) and may result from a lack of enforcement of integrity constraints, typographical errors, the use of synonyms and homonyms across systems, the use of nonstandard abbreviations, or differences in the decomposition of composite attributes.

a. Dirty data

b. Knowledge

c. Data

d. Statistics

A _______________ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

a. role

b. dataspace

c. user

d. instance

A _____________ tool provides an automated framework for the systems development life cycle (SDLC) and is classified according to the extent of support it provides for the SDLC.

a. user

b. CASE

c. audit

d. management

As a DBA, what data dimensions would you describe to top-level managers to obtain their support for endorsing the data administration function?

a. identify and define the need for and role of the DBMS in the organization

b. emphasize the importance of data as a company asset, to be managed as any other asset

c. the need to illustrate and explain the impact of a DBMS in an organization

d. All of these choices are correct.

Which of the following special considerations must you take into account when introducing a DBMS into an organization?

a. Expect some resistance to change

b. How to deal with resistance to change

c. Retraining requirements for the new system

d. All of these choices are correct.

Database performance will naturally __________ as the database grows and more users access it.

a. increase

b. stabilize

c. change

d. decrease

________are general statements of direction or action that communicate and support DBA goals. Examples include: all users must have passwords or passwords must be changed every six months.

a. Policies

b. Standards

c. Documents

d. Procedures

Which of the following cloud related features should be included on a DBA’s checklist of desired DBMS features?

a. Downtime history

b. Data loss contingencies

c. Security

d. All of these choices are correct.

Which of the following statements best explains the role of databases in organizations?

a. The database’s predominant role is to support client information at all levels in the organization.

b. The database’s predominant role is to support user transactions at all levels in the organization.

c. The database’s predominant role is to support managerial decision making at all levels in the organization.

d. None of these choices are correct.

A database _________ is a logical section of the database that belongs to a given user and is identified by the username.

a. datafile

b. role

c. schema

d. user

The ________________ is responsible for controlling the overall corporate data resources, both computerized and manual.

a. database administrator (DBA)

b. security administrator (SA)

c. data administrator (DA)

d. database manager (DM)

Which of the following should NOT be included on a DBA’s checklist of desired DBMS features?

a. Portability and standards

b. Security and integrity

c. Application development support

d. Employment contracts

A ________________ is a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

a. security policy

b. security standard

c. security officer

d. security portfolio

A _______________ physically stores the database’s data and is associated with only one tablespace but can reside in a different directory on the hard disk or on multiple hard disks.

a. datafile

b. role

c. user

d. instance

________are written instructions that describe a series of steps to be followed during the performance of a given activity. They must be developed within existing working conditions, and they must support and enhance the working environment.

a. Procedures

b. Standards

c. Documents

d. Policies

Which of the following is a reason why data quality is important?

a. Without it accurate and timely information cannot be produced

b. Without it, organizations can fail in their co

Get a 10% discount on an order above $50
Use the following coupon code :DUE